Sciweavers

675 search results - page 120 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
IPPS
2005
IEEE
15 years 3 months ago
On Constructing k-Connected k-Dominating Set in Wireless Networks
An important problem in wireless networks, such as wireless ad hoc and sensor networks, is to select a few nodes to form a virtual backbone that supports routing and other tasks s...
Fei Dai, Jie Wu
IWNAS
2006
IEEE
15 years 3 months ago
Mobility Control with Local Views of Neighborhood in Mobile Networks
Recent work in mobile ad hoc networks, simply MANETs, has drawn attention to the mobility capability of each node. In [5], it is proved that the optimal positions of the relay nod...
Zhen Jiang, Jie Wu, Robert Kline
SENSYS
2003
ACM
15 years 2 months ago
Minimum-energy asynchronous dissemination to mobile sinks in wireless sensor networks
Data dissemination from sources to sinks is one of the main functions in sensor networks. In this paper, we propose SEAD, a Scalable Energy-efficient Asynchronous Dissemination pr...
Hyung Seok Kim, Tarek F. Abdelzaher, Wook Hyun Kwo...
AINA
2006
IEEE
15 years 3 months ago
Application Programming Interface for Configuration of Multi-Robot Sensor Networks
In this paper we propose a design of Application Programming Interfaces (APIs) for configuration of Multi-Robot Sensor Networks (MRSNs). Such networks have unique aspects: intenti...
Junya Yamashita, Ryohei Suzuki, Kei Sawai, Hiroki ...
MOBIHOC
2006
ACM
15 years 9 months ago
Minimizing recovery state In geographic ad-hoc routing
Geographic ad hoc networks use position information for routing. They often utilize stateless greedy forwarding and require the use of recovery algorithms when the greedy approach...
Noa Arad, Yuval Shavitt